Cyber Posture

CVE-2025-67230

High

Published: 23 January 2026

Published
23 January 2026
Modified
29 January 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0001 3.1th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-67230 is a high-severity Incorrect Default Permissions (CWE-276) vulnerability in Todesktop Builder. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 3.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-276

Access control policy can specify and enforce secure default permissions for resources.

addresses: CWE-276

Guides setting of default permissions to the minimum required level.

addresses: CWE-276

Establishes requirements for appropriate default permissions on system resources as part of configuration management.

addresses: CWE-276

Baseline establishment and updates on install/upgrade ensure correct default permissions rather than insecure ones.

addresses: CWE-276

Requiring the most restrictive settings instead of defaults prevents incorrect default permissions on resources.

addresses: CWE-276

Requires documented processes that include setting and maintaining correct default permissions for configuration items.

addresses: CWE-276

Requires addressing secure default permissions in physical and environmental protection controls.

addresses: CWE-276

Tailoring explicitly overrides or scopes default permission assignments in the baseline to match the system's actual risk and operational needs.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Vulnerability in custom URL scheme handler directly enables exploitation for client execution via malicious protocol invocation from renderer context.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper permissions in the handler for the Custom URL Scheme in ToDesktop Builder v0.33.0 allows attackers with renderer-context access to invoke external protocol handlers without sufficient validation.

Deeper analysisAI

CVE-2025-67230 is an improper permissions vulnerability (CWE-276) affecting the handler for the Custom URL Scheme in ToDesktop Builder version 0.33.0. Published on 2026-01-23, it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H). The issue stems from insufficient validation, enabling attackers with renderer-context access to invoke external protocol handlers.

Exploitation requires low privileges (PR:L) and renderer-context access, occurring over the network (AV:N) but demanding high attack complexity (AC:H) and user interaction (UI:R). Successful attacks can achieve high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged scope (S:U).

Mitigation guidance appears in ToDesktop's security advisory TDSA-2025-002 at https://www.todesktop.com/security/advisories/TDSA-2025-002 and changelog at https://www.todesktop.com/changelog.

Details

CWE(s)

Affected Products

todesktop
builder
≤ 0.33.0

CVEs Like This One

CVE-2025-67229Same product: Todesktop Builder
CVE-2025-30465Shared CWE-276
CVE-2025-24107Shared CWE-276
CVE-2024-53841Shared CWE-276
CVE-2024-43166Shared CWE-276
CVE-2021-47852Shared CWE-276
CVE-2026-32983Shared CWE-276
CVE-2024-53840Shared CWE-276
CVE-2025-24172Shared CWE-276
CVE-2025-24093Shared CWE-276

References